Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Agile!: The Good, the Hype and the Ugly
Agile!: The Good, the Hype and the Ugly

Are you attracted by the promises of agile methods but put off by the fanaticism of many agile texts? Would you like to know which agile techniques work, which ones do not matter much, and which ones will harm your projects? Then you need Agile!: the first exhaustive, objective review of agile principles, techniques and tools.

...

Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook
Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook

Complete coverage of e-discovery, a growth market, from the people that run the TechnoForensics annual tradeshow.

This book provides IT security professionals with the information (hardware, software, and procedural requirements) needed to create, manage and sustain a digital forensics lab and investigative team that can
...

Cybercrime: Criminal Threats from Cyberspace (Crime, Media, and Popular Culture)
Cybercrime: Criminal Threats from Cyberspace (Crime, Media, and Popular Culture)

This book is an outstanding contribution to the interdisciplinary series on Crime, Media, and Popular Culture from Praeger Publishers. Because of the pervasiveness of media in our lives and the salience of crime and criminal justice issues, we feel it is especially important to provide a home for scholars who are engaged in innovative and...

Digital Forensics and Cyber Crime: Second International ICST Conference, ICDF2C 2010
Digital Forensics and Cyber Crime: Second International ICST Conference, ICDF2C 2010

The Second International ICST Conference on Digital Forensics and Cyber Crime (ICDF2C 2010) was hosted in Abu Dhabi, United Arab Emirates, during October 4–6, 2010. The conference was attended by over 100 international participants including academics, senior government officials from the UAE, and corporate attendees. ICDF2C 2010...

XSLT 2.0 and XPath 2.0 Programmer's Reference (Programmer to Programmer)
XSLT 2.0 and XPath 2.0 Programmer's Reference (Programmer to Programmer)

This book is primarily a practical reference book for professional XSLT developers. It assumes no previous knowledge of the language, and many developers have used it as their first introduction to XSLT; however, it is not structured as a tutorial, and there are other books on XSLT that provide a gentler approach for beginners.

The...

Incident Response and Computer Forensics, Second Edition
Incident Response and Computer Forensics, Second Edition

Completely Updated with the Latest Techniques--Contains All-New Forensics Content and Real-World Scenarios

"An insider's look at the legal, procedural and technical steps of computer forensics and analysis." --Information Security magazine

"This book is an absolute must-read for anyone who plays a role in...

The Practice Of Crime Scene Investigation (Taylor & Francis Forensic Science Series)
The Practice Of Crime Scene Investigation (Taylor & Francis Forensic Science Series)
The authors have included a rather unique review of associative evidence and the Locard exchange principle. The contributors to this text are clearly well-qualified and the resultant stand-alone chapters allow the reader to pick and choose the topics of interest. [A] readable text with relevant content for the forensic specialist.
- Journal:
...
House of Cards and Philosophy: Underwood's Republic (The Blackwell Philosophy and Pop Culture Series)
House of Cards and Philosophy: Underwood's Republic (The Blackwell Philosophy and Pop Culture Series)

Is Democracy overrated?

Does power corrupt? Or do corrupt people seek power?

Do corporate puppet masters pull politicians’ strings?

Why does Frank talk to the camera?

Can politics deliver on the promise of justice?

...
Electronic Monitoring in the Workplace: Controversies and Solutions
Electronic Monitoring in the Workplace: Controversies and Solutions

Due to the use of new technologies, coupled with the fact that there is an increasing amount of work being done online, whether on the Internet, intranets, LANs or other networks, extensive employee monitoring by employers is inexpensive and easy. Employers have legitimate concerns about the efficiency of their employees and the quality of the...

Issues and Trends in Technology and Human Interaction (Advances in Technology and Human Interaction)
Issues and Trends in Technology and Human Interaction (Advances in Technology and Human Interaction)
purposes of humans. It often has unintended and unexpected effects on humans and can be used for purposes other than originally planned. While technology cannot exist without humans, one can equally well argue that humans cannot exist without technology. This relationship touches on many fundamental questions of anthropology, ontology, and...
Neighbor Law: Fences, Trees, Boundaries and Noise
Neighbor Law: Fences, Trees, Boundaries and Noise
The world is full of barking dogs and trespassing trees, spite fences and 2 a.m. rock fests, but your neighbor's lack of consideration needn't be your lifelong headache. The Nolo Press guide to Neighbor Law, eruditely and accessibly written by attorney Cora Jordan, explains all the laws relevant to noise, obstructed views, and...
Emerging Optical Network Technologies: Architectures, Protocols and Performance
Emerging Optical Network Technologies: Architectures, Protocols and Performance
Optical networks have moved from laboratory settings and theoretical research
to real-world deployment and service-oriented explorations. New technologies
such as Ethernet PON and optical packet switching are being explored,
and the landscape is continuously and rapidly evolving. Some of the
key issues involving these new
...
Result Page: 13 12 11 10 9 8 7 6 5 4 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy